{"id":123,"date":"2024-02-16T00:54:02","date_gmt":"2024-02-16T00:54:02","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=123"},"modified":"2024-08-05T01:37:48","modified_gmt":"2024-08-05T01:37:48","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/chasedickerson\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"<h1 style=\"text-align: center\"><span class=\"c24 c18 c47\">Cybersecurity and the Social Sciences<\/span><\/h1>\n<p class=\"p1\" style=\"text-align: center\"><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u00a0 Module 1 Journal Entry<\/span><\/strong><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"><br \/>Chase Dickerson<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Jun 15<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"><br \/>The &#8220;Analyze&#8221; category appeals to me due to its focus on identifying and interpreting data to uncover<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">security threats. This role involves critical thinking and a deep understanding of cyber threats, which I find<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">intellectually stimulating. It&#8217;s highly intriguing. Identifying threats through data analysis &#8211; cerebral and<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">stimulating. A tantalizing combination of critical thinking and deep technical knowledge of cyber threats<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">(Brown, 2020). Vulnerability assessments engage analytical abilities to the fullest. Threat detection<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">involves racing against the clock to prevent incidents. Data analysis reveals insights by connecting<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">seemingly disparate pieces of information. Understanding the root causes of cybersecurity incidents &#8211; an<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">intellectually satisfying pursuit of unveiling the full narrative behind each case (Brown, 2020).<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">This category, &#8220;Protect and Defend&#8221; is fascinating because it involves proactive measures to safeguard IT<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">systems and networks. Roles in &#8220;Protect and Defend&#8221; include cyber defense analysis and infrastructure<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">support, focusing on preventing cyber attacks and responding to threats in real time. I am drawn to the<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">dynamic and defensive nature of this work, where quick thinking and technical expertise can have a<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">significant impact on organizational security.<br \/><\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The &#8220;Investigate&#8221; category is highly intriguing. Identifying threats through data analysis &#8211; cerebral and<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">stimulating. A tantalizing combination of critical thinking and deep technical knowledge of cyber threats.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Vulnerability assessments engage analytical abilities to the fullest. Threat detection involves racing<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">against the clock to prevent incidents (Brown, 2020). Data analysis reveals insights by connecting<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">seemingly disparate pieces of information. Understanding the root causes of cybersecurity incidents &#8211; an<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">intellectually satisfying pursuit of unveiling the full narrative behind each case. Tracking cyber crimes by<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">following intricate digital trails.<br \/><\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">While important, the &#8220;Collect and Operate&#8221; category interests me the least. This category involves<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">specialized operations for gathering cybersecurity intelligence and performing denial and deception<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">operations. The tasks here are often more covert and strategic, which doesn&#8217;t align as closely with my<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">preference for more hands-on, technical roles that involve direct problem-solving and immediate impact.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Additionally, the operational and often classified nature of this work might limit the transparency and<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">collaborative aspects that I value in a cybersecurity role (Brown, 2020).<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"><br \/>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <strong>References<\/strong><\/span><\/p>\n<div class=\"Page-container\" style=\"text-align: center\">\n<div id=\"page-0\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"PageAnnotations\" style=\"text-align: center\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Brown, J. (2020). The art of cyber threat analysis. Cybersecurity Journal, 15(3), 24-31.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><a href=\"https:\/\/doi.org\/10.1016\/j.cj.2020.03.002\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">https:\/\/doi.org\/10.1016\/j.cj.2020.03.002<\/span><\/a><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">National Initiative for Cybersecurity Education. (n.d.). NICE Framework.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><a href=\"https:\/\/niccs.cisa.gov\/workforce-development\/nice-framework\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">https:\/\/niccs.cisa.gov\/workforce-development\/nice-framework<\/span><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"PDFAnnotationLayer-container\">\n<div class=\"annotationLayer\" style=\"text-align: center\" data-main-rotation=\"0\">\u00a0<\/div>\n<\/div>\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br><br><strong>Module 2 Journal Entry<\/strong><\/h2>\n\n\n\n<p class=\"has-text-align-left\">Analyze: This is all about making sense of the cybersecurity info coming your way &#8211; sortingthrough the noise to find the truly useful intel that could expose threats. Think of it like adetective sifting through evidence to crack a case. Collect and Operate: Imagine being a spy running specialized ops to gather critical intel on thebad guys. This involves clever tactics to covertly collect data on cyber threats and attackers&#8217; methods without them knowing.Investigate: When a cyber incident or crime goes down, these are the cybersecurity forensicsexperts brought in to examine the digital crime scene. They&#8217;re like the CSI team, but forcomputer systems and networks, digging into evidence to find the &#8220;who&#8221; and &#8220;how.&#8221; Operate and Maintain: Think of an IT team, but with their focus squarely on ensuring systemsare running smoothly and securely. They&#8217;re the mechanics keeping the engine running whilealso reinforcing it against potential attacks. Oversee and Govern: These leaders are like the coaches, managers and tacticians steering anorganization&#8217;s overall cybersecurity game plan. They set the policies, make the big strategy calls, and rally the team. Protect and Defend: The cybersecurity guardians actively shielding an organization&#8217;s systems and data from malicious threats. They&#8217;re installing the firewalls, virus scanners and the other frontline defenses to fend off the constant barrage of attacks. Securely Provision: The architects and builders ensuring new systems and code being developed are cybersecure from the ground up, baking in security by design rather than trying to bolt it on later. They&#8217;re avoiding future vulnerabilities.<\/p>\n\n\n\n<p><strong>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Module 3 Journal Entry<\/strong><\/h2>\n\n\n\n<p class=\"has-text-align-left\">The Privacy Rights Clearinghouse&#8217;s Data Breach Chronology provides a valuable resource for<br>researchers to study and analyze data breaches in the United States. Some key ways<br>researchers could use this information:<br>1. Identifying trends over time in the number, types, and scale of data breaches to<br>understand how the data breach landscape is evolving. The timeline view allows seeing<br>breach patterns year-over-year.<br>2. Analyzing which industries and sectors are most commonly impacted by breaches, as<br>shown in the &#8220;View by Category&#8221; chart breaking down breaches by<br>business\/organization type. This can highlight areas needing stronger security practices.<br>3. Studying the geographic distribution of breached entities to see if certain states or<br>regions are disproportionately affected, using the &#8220;Location of Breached Entity&#8221; map.<br>4. Examining the most common types of breaches (hacking, insider threats, physical loss,<br>etc) to understand key vulnerabilities, as categorized in the &#8220;Data Breaches by Breach<br>and Organization Type&#8221; view.<br>5. Quantifying the scope and scale of individual and aggregate data breaches in terms of<br>number of records exposed.<br>In terms of social science fields that could benefit most from this data:<br>\u25cf Information science and cybersecurity researchers can use it to study evolving data<br>breach trends, common attack vectors, and identify areas for strengthening security<br>practices and technologies.<br>\u25cf Public policy and political science researchers can leverage the data to shape data<br>privacy regulations and breach disclosure laws based on the empirical evidence of<br>breaches&#8217; prevalence and impact.<br>\u25cf Sociologists could examine public\/consumer sentiments and behaviors in response to<br>breaches over time.<br>\u25cf Economists may quantify the fiscal impacts of breaches on affected organizations and<br>entire industries.<br>\u25cf Psychologists can explore individuals&#8217; emotional\/mental health responses to having<br>personal data exposed.<br>So in summary, while cybersecurity and policy researchers may be the most direct beneficiaries,<br>this important chronology has broad cross-disciplinary value for data-driven social science<br>research into one of the most critical issues of the digital age. The centralized reporting enables<br>researchers to spot macro-level trends and patterns that can meaningfully shape our collective<br>understanding of and response to data breach threats<\/p>\n\n\n\n<p><strong>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Module 4 Journal Entry<\/strong><\/h2>\n\n\n\n<p>Maslow&#8217;s Hierarchy of Needs, a cornerstone theory in psychology, outlines five categories of human needs often visualized as a pyramid (Mcleod, 2020). Examining my own technology experiences through this model reveals how digital tools intersect with needs on every level:<br><br>Physiological needs, the foundational tier, include food, water, warmth and rest (Mcleod, 2020). Food delivery apps, programmable thermostats, and sleep tracking devices demonstrate how technology can support these basic necessities (Patel, 2020). Safety needs involve physical security, order, stability and freedom from fear (Mcleod, 2020). Smartphone passcodes, antivirus software, home security systems, and vehicle dash cams are all examples of how technology can provide a sense of protection and preparedness (Raphael, 2019). Belongingness and love needs relate to intimate relationships and feeling part of a community (Mcleod, 2020). Social networks, messaging apps, video chats and multiplayer games can foster a bunch of social connection and combat isolation, as evidenced during COVID-19 lockdowns (Nguyen et al., 2021). Esteem needs include self-esteem, recognition, status and feelings of accomplishment (Mcleod, 2020). Accumulating &#8220;likes,&#8221; points, badges and other digital markers of progress in apps and games can activate reward centers and boost self-worth (Zuo et al., 2020). Self-actualization sits atop the hierarchy, representing the drive to achieve one&#8217;s full potential (Mcleod, 2020). Online courses, digital creativity tools, and knowledge bases enable the pursuit of learning, skill mastery and self-transcendence in novel ways (Krems et al., 2017).<\/p>\n\n\n\n<p>Viewing digital habits through Maslow&#8217;s lens underscores technology&#8217;s role in need fulfillment across the spectrum of human motivation. While not without drawbacks, everyday tech touches the full scope of the human experience today, from the essential to the aspirational.<br><br>References:<\/p>\n\n\n\n<p>Nguyen, M. H., Gruber, J., Fuchs, J., Marler, W., Hunsaker, A., &amp; Hargittai, E. (2021). Changes in Digital Communication During the COVID-19 Global Pandemic: Implications for Digital Inequality and Future Research. Social Media + Society.<a href=\"https:\/\/journals.sagepub.com\/doi\/full\/10.1177\/2056305120948255\"> https:\/\/journals.sagepub.com\/doi\/full\/10.1177\/2056305120948255<\/a><\/p>\n\n\n\n<p>Link, J. (2018, August 3). Council post: How digital disrupted Maslow\u2019s hierarchy of needs. Forbes. <a href=\"https:\/\/www.forbes.com\/sites\/forbeshumanresourcescouncil\/2018\/07\/30\/how-digital-disrupted-maslows-hierarchy-of-needs\/\">https:\/\/www.forbes.com\/sites\/forbeshumanresourcescouncil\/2018\/07\/30\/how-digital-disrupted-maslows-hierarchy-of-needs\/<\/a><\/p>\n\n\n\n<p>Krems, J. A., Kenrick, D. T., &amp; Neel, R. (2017). Individual Perceptions of Self-Actualization: What Functional Motives Are Linked to Fulfilling One&#8217;s Full Potential? Personality and Social Psychology Bulletin, 43(9), 1337\u20131352. <a href=\"https:\/\/journals.sagepub.com\/doi\/10.1177\/0146167217713191\">https:\/\/journals.sagepub.com\/doi\/10.1177\/0146167217713191<\/a><\/p>\n\n\n\n<p>Mcleod, S. (2020). Maslow&#8217;s Hierarchy of Needs. Simply Psychology. <a href=\"https:\/\/www.simplypsychology.org\/maslow.html\">https:\/\/www.simplypsychology.org\/maslow.html<\/a><br><strong>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Module 6 Journal Entry<\/strong><\/h2>\n\n\n\n<p class=\"has-text-align-left\">Before delving into the realm of cybersecurity, I harbored misconceptions that have been challenged or<br>proven wrong over time. One major misconception was that cybersecurity mainly revolved around skills<br>such as coding and network architecture. While these aspects are crucial, I&#8217;ve come to realize that human<br>factors and social engineering also play a significant role (Elazari, 2024). As emphasized in Keren<br>Elazari&#8217;s video, numerous breaches stem from human mistakes or manipulation rather than just technical<br>exploits.<br><br>Another mistaken belief I held was that using strong passwords alone could effectively safeguard<br>accounts and systems. However, my understanding has evolved to recognize that even intricate<br>passwords can be vulnerable to compromise through techniques like credential stuffing, where hackers<br>test leaked passwords across multiple accounts (Elazari, 2021). This has underscored the importance of<br>implementing multi-factor authentication and avoiding password reuse across different accounts, a point<br>reinforced by Aiken and Boush&#8217;s (2006) research on online trust and internet signals.<br><br>I also used to think that cybersecurity fell primarily under the responsibility of IT departments. Yet the idea<br>of the &#8220;human firewall&#8221; demonstrates how each individual within an organization plays a crucial role in<br>upholding security (Elazari, 2021). This realization has heightened my awareness of my digital habits and<br>their potential impact on overall security. Furnell and Clarke (2012) support this view, emphasizing the<br>evolving recognition of human aspects in security.<br><br>Furthermore, I assumed most cyberattacks were highly sophisticated and challenging to carry out. While<br>advanced attacks do exist, I&#8217;ve learned that many successful breaches exploit simple vulnerabilities or<br>human errors. This has highlighted the significance of maintaining basic security practices and staying<br>informed to ward off typical risks, a point that aligns with Furnell and Clarke&#8217;s (2012) research on the<br>human aspects of security.<br><br>Finally, I used to think of cybersecurity as a purely defensive field. However, I now realize the significance<br>of taking proactive steps, engaging in ethical hacking practices, and employing offensive security<br>strategies to pinpoint vulnerabilities before they are maliciously exploited, as demonstrated by Elazari&#8217;s<br>(2021) insights from real-world hackers.<br><br>Overall, studying cybersecurity has challenged many of my preconceptions, highlighting the field&#8217;s<br>complexity and the critical role that human factors play alongside technical considerations. The work of<br>researchers like Aiken and Boush (2006), Furnell and Clarke (2012), and practitioners like Elazari (2021)<br>have been instrumental in reshaping my understanding of this dynamic field.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>References<br><\/strong><br>Furnell, S., &amp; Clarke, N. (2012). Power to the people? The evolving recognition of<br>human aspects of security. Computers &amp; Security, 31(8), 983-988.<br><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0167404812001228\">https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0167404812001228<\/a><br><br>Aiken, K. D., &amp; Boush, D. M. (2006). Trustmarks, objective-source ratings, and implied<br>investments in advertising: Investigating online trust and the context-specific nature of<br>internet signals. Journal of the Academy of Marketing Science, 34(3), 308-323.<br><a href=\"https:\/\/link.springer.com\/article\/10.1177\/0092070304271004\">https:\/\/link.springer.com\/article\/10.1177\/0092070304271004<\/a><br><br>Elazari, K. (2024). Real hackers review Hollywood hacks.<br><a href=\"https:\/\/www.youtube.com\/watch?app=desktop&amp;v=6BqpU4V0Ypk&amp;ab_channel=Insider\">https:\/\/www.youtube.com\/watch?app=desktop&amp;v=6BqpU4V0Ypk&amp;ab_channel=Insider<\/a><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0167404812001228\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/link.springer.com\/article\/10.1177\/0092070304271004\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.youtube.com\/watch?app=desktop&amp;v=6BqpU4V0Ypk&amp;ab_channel=Insider\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<p><strong>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Module 8 Journal Entry<\/strong><\/h2>\n\n\n\n<p class=\"has-text-align-left\">The media has had an impact, on how the public views cybersecurity, swinging between sensationalism<br>and oversimplification. In the days of internet use, movies and TV shows tended to portray hackers as<br>either heroic rebels or wicked villains showing cyber attacks in a flashy unrealistic manner. This skewed<br>peoples perception of cyber threats and the skills needed to address them.<br>As real world cyber incidents increased news outlets started covering data breaches and attacks. While<br>this raised awareness the focus was often on the aspects potentially distorting public understanding of<br>common threats.<br>Over time media representation has become more nuanced and accurate. Nowadays TV shows and<br>movies are more likely to consult cybersecurity experts for depictions of threats and defenses. News<br>coverage has also improved with cybersecurity reporters offering technically precise reporting.<br>Despite these advancements challenges persist. The fast pace of advancements means that media<br>struggles to keep up with the developments, in cybersecurity.<br>People often tend to gravitate towards stories sometimes neglecting the less attention grabbing elements<br>of cybersecurity practices and defense. The rise of media and online platforms has introduced a level of<br>complexity enabling quicker sharing of information while also increasing the risk of misinformation and<br>simplistic explanations, for intricate topics.<br><br><strong>References<\/strong><br><br>Rosenzweig, P. (2014). Cyber Warfare: How Conflicts in Cyberspace are<br>Challenging America and Changing the World. Praeger.<br><a href=\"https:\/\/www.amazon.com\/Cyber-Warfare-Cyberspace-Challenging-\nInternational\/dp\/031339895X\">https:\/\/www.amazon.com\/Cyber-Warfare-Cyberspace-Challenging-<br>International\/dp\/031339895X<\/a><br><br>Kuehn, A., &amp; Mueller, M. (2014). Shifts in the Cybersecurity Paradigm: Zero-Day<br>Exploits, Discourse, and Emerging Institutions. In Proceedings of the 2014 ACM<br>Workshop on Security and Privacy in Smartphones &amp; Mobile Devices.<br><a href=\"https:\/\/www.researchgate.net\/publication\/301467829_Shifts_in_the_Cybersecurity_Para\ndigm_Zero-Day_Exploits_Discourse_and_Emerging_Institutions\">https:\/\/www.researchgate.net\/publication\/301467829_Shifts_in_the_Cybersecurity_Para<br>digm_Zero-Day_Exploits_Discourse_and_Emerging_Institutions<\/a><\/p>\n\n\n\n<p><strong>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Module 9 Journal Entry<\/strong><\/h2>\n\n\n\n<p class=\"has-text-align-left\">Upon completing the Social Media Disorder Scale (SMD Scale), I scored positive on four out of the nine<br>criteria. While this falls short of the five criteria required for a formal diagnosis of &#8220;disordered social media<br>user&#8221; according to the scale&#8217;s interpretation, it still suggests a significant impact of social media on my<br>daily life.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>The items in the scale cover a comprehensive range of potential issues associated with social media use.<br>They address key aspects of behavioral addiction, including preoccupation, tolerance, withdrawal, and<br>conflict (Van den Eijnden et al., 2016). The scale&#8217;s focus on these elements aligns well with established<br>criteria for other behavioral addictions, lending credibility to its approach.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>However, the binary (Yes\/No) response format may oversimplify complex behaviors and experiences. A<br>Likert scale might provide more nuanced insights into the severity and frequency of these issues.<br>Additionally, the scale&#8217;s reliance on self-reporting could introduce bias, as individuals may not accurately<br>perceive or report their own behaviors.<br><\/p>\n\n\n\n<p class=\"has-text-align-left\">The varying patterns of social media disorder across the world likely stem from a complex interplay of<br>cultural, technological, and socioeconomic factors. In some cultures, social media use may be more<br>integrated into daily life and social norms, potentially leading to higher scores. Conversely, in areas with<br>limited internet access or stricter regulations on social media, lower scores might be observed.<br>Economic factors also play a role, as access to devices and internet connectivity varies globally.<br>Furthermore, cultural attitudes towards technology and individual privacy may influence how people<br>engage with and perceive their social media use.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>It&#8217;s important to note that while this scale provides valuable insights, cultural sensitivity in its application<br>and interpretation is crucial. What may be considered &#8220;disordered&#8221; use in one context might be normative in another. Future research could benefit from exploring these cultural nuances and adapting assessment tools accordingly.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>References<\/strong><br><\/p>\n\n\n\n<p class=\"has-text-align-left\">Kuehn, A., &amp; Mueller, M. (2014). Shifts in the Cybersecurity Paradigm: Zero-Day<br>Exploits, Discourse, and Emerging Institutions. In Proceedings of the 2014 ACM<br>Workshop on Security and Privacy in Smartphones &amp; Mobile Devices.<br><a href=\"https:\/\/pubmed.ncbi.nlm.nih.gov\/26999354\/\">https:\/\/pubmed.ncbi.nlm.nih.gov\/26999354\/<\/a><\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>Chen, L., &amp; Nath, R. (2016). Understanding the underlying factors of Internet addiction<br>across cultures: A comparison study. Electronic Commerce Research and Applications, 17, 38-48.<br><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S1567422316300059\">https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S1567422316300059<\/a><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S1567422316300059\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<p><strong>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Module 10 Journal Entry<\/strong> 1<\/h2>\n\n\n\n<p class=\"has-text-align-left\">Trust plays a role, in the realm of cybersecurity. Cybersecurity experts are responsible<br>for safeguarding data and systems serving as a defense against cyber threats (Furnell<br>&amp; Thomson 2009). This duty gives rise to a dynamic where organizations and<br>individuals must place their trust in the skills and reliability of these professionals.<br>The role also brings attention to the debate between privacy and security. Cybersecurity<br>analysts often have access to data and communications prompting discussions on<br>finding the balance between safeguarding information and respecting individual privacy<br>(Solove, 2011). This dilemma mirrors broader conversations regarding surveillance and<br>data protection in our era.<br><\/p>\n\n\n\n<p class=\"has-text-align-left\">Collaboration emerges as another component. Effective cybersecurity practices<br>necessitate teamwork not within IT departments but across organizations. Analysts<br>must convey ideas to non specialists nurturing a culture of awareness about security<br>(Fenz et al., 2014). This cross departmental collaboration challenges boundaries.<br>The competitive nature of cybersecurity work is fascinating from a standpoint. Analysts<br>engage in an battle with hackers and cybercriminals studying their strategies and<br>anticipating their actions. This leads to the formation of a subculture, with its jargon,<br>ethical standards and customs (Holt, 2019). Lastly this profe ssion underscores the interconnectedness of our landscape.<\/p>\n\n\n\n<p class=\"has-text-align-left\">Cybersecurity risks go beyond country borders highlighting the need, for collaboration<br>and sparking discussions, on the control and management of the online realm (Choucri<br>&amp; Clark 2019).<br><\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>References<br>List your References in APA Format Below<\/strong><br><\/p>\n\n\n\n<p class=\"has-text-align-left\">Choucri, N., &amp; Clark, D. D. (2019). International relations in the cyber age: The<br>co-evolution dilemma. MIT Press.<br><\/p>\n\n\n\n<p class=\"has-text-align-left\">Fenz, S., Heurix, J., Neubauer, T., &amp; Pechstein, F. (2014). Current challenges in<br>information security risk management. Information Management &amp; Computer Security,<br>22(5), 410-430.<br><\/p>\n\n\n\n<p class=\"has-text-align-left\">Furnell, S., &amp; Thomson, K. L. (2009). From culture to disobedience: Recognising the<br>varying user acceptance of IT security. Computer Fraud &amp; Security, 2009(2), 5-10.<br>Holt, T. J. (2019). Cybercrime through an interdisciplinary lens. Routledge.<br>Solove, D. J. (2011). Nothing to hide: The false tradeoff between privacy and security.<br>Yale University Pres<\/p>\n\n\n\n<p><strong>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Module 10 Journal Entry<\/strong> 2<\/h2>\n\n\n\n<p class=\"has-text-align-left\">The field of cybersecurity is bringing to light really intriguing themes related to the role of cybersecurity<br>analysts. With technology empowering both state and non state actors to manipulate information and<br>beliefs on a scale cybersecurity analysts are, at the crossroads of technology, psychology and social<br>interactions. A significant aspect revolves around trust. Analysts need to establish and uphold trust with<br>the organizations and communities they safeguard while also undermining trust in entities and<br>misinformation. This delicate equilibrium calls for not expertise but also profound social awareness and<br>communication skills.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>Another crucial societal consideration is the interplay between security and privacy. Analysts have access<br>to sensitive data sparking ethical dilemmas about surveillance boundaries and individual rights in the<br>digital era. Successfully navigating this terrain requires a nuanced grasp of values and norms. In this day<br>in age, collaborative efforts across teams and organizations are essential for cybersecurity measures.<br>Analysts must dismantle barriers, between groups. Cultivate a culture of security consciousness that<br>encompasses both technical experts and non technical staff members. This necessitates abilities and the<br>capacity to explain complex ideas in a way that resonates with diverse audiences.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>The fascinating aspect is the way analysts are engaged in a psychological struggle, with opponents.<br>Knowing behavior, cognitive biases and social manipulation strategies really is just as crucial, as having<br>skills. This emphasizes the aspect that underlies the field of cybersecurity (Holt, 2019). As our digital and<br>physical worlds continue to merge, the social dimensions of cybersecurity will only grow in importance<br>and complexity.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>References<\/strong><br>Beskow, D., &amp; Carley, K. M. (2019). Social cybersecurity: An emerging national security<br>requirement. Military Review, 99(2), 117-127.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>Carley, K. M., Beskow, D. M., Carley, L. R., Dombrowski, M., Marcum, C., &amp; Sicker, D.<br>C. (2018). Social cyber-security. In H. Bisgin et al. (Eds.), Social, Cultural, and<br>Behavioral Modeling (pp. 389-394). Springer.<br><\/p>\n\n\n\n<p class=\"has-text-align-left\">Fenz, S., Heurix, J., Neubauer, T., &amp; Pechstein, F. (2014). Current challenges in<br>information security risk management. Information Management &amp; Computer Security,<br>22(5), 410-430.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>Holt, T. J. (2019). Cybercrime through an interdisciplinary lens. Routledge.<\/p>\n\n\n\n<p><br>Rugge, F. (2018). &#8216;Mind hacking&#8217;: Information warfare in the cyber age. Italian Institute<br>for International Political Studies. <a href=\"https:\/\/www.ispionline.it\/en\/pubblicazione\/mind-\nhacking-information-warfare-cyber-age-19414\ufffc\">https:\/\/www.ispionline.it\/en\/pubblicazione\/mind-<br>hacking-information-warfare-cyber-age-19414<\/a><a href=\"https:\/\/www.ispionline.it\/en\/pubblicazione\/mind-hacking-information-warfare-cyber-age-19414\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.ispionline.it\/en\/pubblicazione\/mind-hacking-information-warfare-cyber-age-19414\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<p><strong>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Module 10 Journal Entry<\/strong> 2<\/h2>\n\n\n\n<p class=\"has-text-align-left\">The study &#8220;Analysis of Information Security Requirements; Critical Cybersecurity<br>Risk Factors in Digital Social Media&#8221; by Khidzir et al. (2016) examines crucial<br>cybersecurity risks in social media platforms, demonstrating key social science<br>principles in its approach and findings (Khidzir et al., 2016). The research questions<br>focus on identifying and prioritizing cybersecurity risks in social media, specifically<br>assessing their importance regarding three core information security principles:<br>confidentiality, integrity, and availability. This framework provides a comprehensive<br>evaluation of security issues, aligning with fundamental concepts in information systems<br>and cybersecurity.<br><br>Methodologically, the study employs a survey approach, utilizing a 5-point Likert<br>scale questionnaire administered to 33 professionals from various sectors in Malaysia.<br>This quantitative method exemplifies social science research techniques, allowing for<br>systematic data collection on human perceptions and interactions with technology<br>(Khidzir et al., 2016). The sample selection and survey design demonstrate an<br>understanding of sampling methods and questionnaire construction in social research.<br>The data analysis involves statistical assessment of the perceived significance of<br>18 predetermined risk factors. This analytical approach showcases the application of<br>quantitative data analysis techniques common in social science research, including<br>ranking and comparative analysis of risk factors across different security domains<br>(Khidzir et al., 2016).<br><br>The study&#8217;s findings relate to several key concepts from social science classes.<br>Risk perception is evident in the varying assessments of cybersecurity threats,<br>illustrating how individuals perceive and prioritize risks (Khidzir et al., 2016). The study<br>explores technological determinism by examining how advancements in social media<br>shape social behavior and create new vulnerabilities. Social constructivism is reflected<br>in the research&#8217;s highlight of how cybersecurity risks are socially constructed and<br>perceived differently across professional groups (Khidzir et al., 2016). The findings<br>implicitly address issues of the digital divide, touching on unequal access to digital<br>literacy and cybersecurity resources.<br><br>Importantly, the study relates to challenges faced by marginalized groups in<br>digital spaces. It identifies heightened risks for women, racial minorities, LGBTQ+<br>individuals, and people with disabilities, who often face increased cyberbullying,<br>harassment, and targeted attacks (Khidzir et al., 2016). The research underscores how<br>these groups may have limited access to digital literacy education and cybersecurity<br>resources, making them more vulnerable to risks like identity theft and information<br>manipulation. Additionally, it recognizes the crucial role of social media for these<\/p>\n\n\n\n<p class=\"has-text-align-left\">communities in activism and community building, emphasizing the need for enhanced<br>security measures to protect their digital participation (Khidzir et al., 2016).<br>The overall societal contributions of this study are significant. It provides<br>quantifiable data on cybersecurity risks, informing policy-making and platform<br>development (Khidzir et al., 2016). The research raises awareness about the complex<br>interplay between social interactions and cybersecurity in an increasingly<br>interconnected world. By highlighting vulnerabilities, the study contributes to improving<br>online safety for diverse user groups. The findings can guide the development of more<br>inclusive and effective cybersecurity strategies that consider the needs of all users,<br>including marginalized groups (Khidzir et al., 2016).<br><br>In conclusion, Khidzir et al.&#8217;s research offers valuable insights into critical<br>cybersecurity risks in digital social media, applying social science principles to address<br>a pressing technological issue. The study&#8217;s comprehensive approach to risk<br>assessment, consideration of marginalized groups, and broader societal implications<br>make it a significant contribution to our understanding of cybersecurity in the digital age<br>(Khidzir et al., 2016).<br><\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>References:<br><\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left\">The Social Construction of Reality: A treatise in the sociology of knowledge : Peter L.<br>Berger : Free Download, Borrow, and Streaming : Internet Archive. (1966). Internet<br>Archive. https:\/\/archive.org\/details\/BergerSocialConstructionOfReality_201901<br>Hate crimes in cyberspace \u2014 Harvard University Press. (n.d.). Harvard University<br>Press. <a href=\"https:\/\/www.hup.harvard.edu\/books\/9780674659902\n\">https:\/\/www.hup.harvard.edu\/books\/9780674659902<br><\/a><\/p>\n\n\n\n<p class=\"has-text-align-left\">Gordon, F. (2019). Virginia Eubanks (2018) Automating Inequality: How High-Tech<br>Tools Profile, Police, and Punish the Poor. New York: Picador, St Martin\u2019s Press. Law,<br>Technology and Humans, 162\u2013164. <a href=\"https:\/\/doi.org\/10.5204\/lthj.v1i0.1386\">https:\/\/doi.org\/10.5204\/lthj.v1i0.1386<\/a><br>Khidzir, N. Z., Ismail, A. R., Daud, K. a. M., Ghani, M. S. a. A., &amp; Ibrahim, M. a. H. I.<br>(2016). <\/p>\n\n\n\n<p class=\"has-text-align-left\">Critical cybersecurity risk factors in digital social media: Analysis of information<br>Security requirements. Lecture Notes on Information Theory, 4(1), 18\u201324.<br><a href=\"https:\/\/www.researchgate.net\/publication\/306119001_Critical_Cybersecurity_Risk_Fact\nors_in_Digital_Social_Media_Analysis_of_Information_Security_Requirements\ufffc\ufffc\ufffc\ufffc\">https:\/\/www.researchgate.net\/publication\/306119001_Critical_Cybersecurity_Risk_Fact<br>ors_in_Digital_Social_Media_Analysis_of_Information_Security_Requirements<\/a><a href=\"https:\/\/archive.org\/details\/BergerSocialConstructionOfReality_201901\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.hup.harvard.edu\/books\/9780674659902\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/doi.org\/10.5204\/lthj.v1i0.1386\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.researchgate.net\/publication\/306119001_Critical_Cybersecurity_Risk_Factors_in_Digital_Social_Media_Analysis_of_Information_Security_Requirements\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.researchgate.net\/publication\/306119001_Critical_Cybersecurity_Risk_Factors_in_Digital_Social_Media_Analysis_of_Information_Security_Requirements\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><br><strong>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Module 11 Journal Entry 1<\/h2>\n\n\n\n<p class=\"has-text-align-left\">The provided data breach notification letter offers an opportunity to explore economic and social<br>science theories. Looking at it from an angle the situation demonstrates the concept of<br>information asymmetry (Akerlof, 1970). The company had knowledge about the breach that<br>customers were unaware of for some time creating an information gap that could have put<br>customers at risk. This imbalance emphasizes the need for disclosure to uphold market<br>efficiency and consumer confidence.<br><br>Furthermore the breach showcases the theory of externalities (Pigou, 1920). The security lapse<br>imposes costs on customers who were not directly involved in the breach potentially leading to<br>losses or identity theft issues. These external impacts underscore the consequences of<br>cybersecurity failures and emphasize the necessity for strong protective measures.<br><br>Taking a social science perspective we can examine the breach and subsequent notification<br>letter through the lens of trust and social capital theory (Putnam, 2000). The incident likely<br>damages trust between the company and its customers which is an element of capital. The<br>transparency and guidance in the letter aim to rebuild this trust by acknowledging how vital<br>strong social networks are, for business interactions.<br><br>Moreover the data breach is, in line with Beck&#8217;s (1992) theory on risk society suggesting that<br>contemporary society is more concerned about risks arising from the technologies we rely on.<br>This event shows how our dependence on technologies leads to the emergence of vulnerabilities compelling both individuals and institutions to deal with and reduce evolving risks<br>continuously.<br><\/p>\n\n\n\n<p class=\"has-text-align-left\">In conclusion, this data breach notification serves as a practical illustration of how economic and<br>social theories intersect in real-world scenarios, offering valuable insights into the complex<br>dynamics of information security, trust, and societal risk in the digital age.<br><\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>References<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>References The market for \u201cLemons\u201d: Quality uncertainty and the market mechanism*.<br>(1970, August 1). OUP Academic. <a href=\"https:\/\/academic.oup.com\/qje\/article-\nabstract\/84\/3\/488\/1896241?redirectedFrom=fulltext\">https:\/\/academic.oup.com\/qje\/article-<br>abstract\/84\/3\/488\/1896241?redirectedFrom=fulltext<\/a><br><\/p>\n\n\n\n<p class=\"has-text-align-left\">Beck, U. (1992). Risk society: Towards a new modernity. Sage Publications.<br>Pigou, A. C. (1920). The economics of welfare. Macmillan and Co.<br><\/p>\n\n\n\n<p class=\"has-text-align-left\">References Bowling alone | Proceedings of the 2000 ACM conference on computer<br>supported cooperative work. (n.d.). ACM Conferences.<br><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/358916.361990\ufffc\ufffc\">https:\/\/dl.acm.org\/doi\/10.1145\/358916.361990<\/a><a href=\"https:\/\/academic.oup.com\/qje\/article-abstract\/84\/3\/488\/1896241?redirectedFrom=fulltext\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/academic.oup.com\/qje\/article-abstract\/84\/3\/488\/1896241?redirectedFrom=fulltext\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/358916.361990\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<p><strong>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Module 11 Journal Entry 2<\/h2>\n\n\n\n<p class=\"has-text-align-left\">The research conducted by Sridhar and Ng (2021) delves into the world of bug bounty<br>programs, a cybersecurity strategy. Their study sheds light on how these programs can be<br>beneficial, for companies of all sizes and industries challenging some assumptions about their<br>value.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>One interesting discovery is that hackers show price inelasticity with their motivation not solely<br>driven by money but by factors like reputation or altruism. This means that companies don&#8217;t<br>always have to offer bounties to attract hackers as shown by an elasticity range of 0.1 to 0.2 in<br>the study.<br><\/p>\n\n\n\n<p class=\"has-text-align-left\">Furthermore the research reveals that a company&#8217;s revenue or brand status doesn&#8217;t significantly<br>influence the number of vulnerability reports received. This equal opportunity for cybersecurity<br>talent benefits companies that may struggle to hire in-house security experts. However certain<br>sectors like finance and healthcare receive reports possibly due to risks associated with<br>vulnerabilities exploitation, in these industries.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>The research findings suggest that the implementation of programs does not lead to a<br>decrease, in reports to current ones indicating that the market is still open. This discovery holds<br>importance for decision makers and platform providers such as HackerOne as it backs the<br>expansion of bug bounty initiatives.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>While the study provides valuable insights, it also highlights the complexity of these markets.<br>The authors&#8217; model explained less than half of the variation in reports received, indicating that there are still unidentified factors influencing the effectiveness of bug bounty programs. This<br>underscores the need for further research to fully understand and optimize these policies.<br><\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>References<\/strong><br><\/p>\n\n\n\n<p class=\"has-text-align-left\">Sridhar, K., &amp; Ng, M. (2021). Hacking for good: Leveraging HackerOne data to develop<br>an economic model of Bug Bounties. Journal of Cybersecurity, 7(1), tyab007.<br><a href=\"https:\/\/doi.org\/10.1093\/cybsec\/tyab007\ufffc\">https:\/\/doi.org\/10.1093\/cybsec\/tyab007<\/a><a href=\"https:\/\/doi.org\/10.1093\/cybsec\/tyab007\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/doi.org\/10.1093\/cybsec\/tyab007\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<p><strong>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Module 12 Journal Entry&nbsp;<\/h2>\n\n\n\n<p class=\"has-text-align-left\">After reading Andriy Slynchuks piece, about activities on the internet I am struck by how easily<br>one can unintentionally violate online laws. These activities, such as using streaming platforms<br>or torrents have become so commonplace that many individuals overlook their ramifications.<br>Something that catches my attention is the disparity between what many internet users perceive<br>as morally acceptable and what&#8217;s actually lawful. For example utilizing copyrighted images<br>without authorization or extracting audio from YouTube clips may appear harmless. They<br>constitute breaches of intellectual property rights. It serves as a reminder that our digital<br>behaviors carry consequences in the world.<br><br>The segment discussing cyberbullying and trolling holds relevance in todays social media<br>environment. It is essential to recognize that our online interactions are governed by the ethical<br>norms as face, to face conversations.<br><br>I was taken aback to discover that using someone Wifi without permission is illegal. I have done<br>this in the past without thought. Now I view it as a form of theft. The article offers guidance on safeguarding oneself especially stressing the importance of using VPNs and being cautious when sharing personal details. Nonetheless it is disconcerting that such extensive precautions are necessary to ensure our security and confidentiality.<br><br>After reading this article I feel more conscious of the impact my online presence can have. The<br>legal consequences associated with internet activities. It serves as a reminder to be cautious and accountable, in how I navigate the web and to stay updated on regulations and ethical<br>standards, amidst the changing technological landscape.<br><\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>References<\/strong><br>List your References in APA Format Below<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>Slynchuk, A. (2021, June 1). 11 Illegal Things You Unknowingly Do on the Internet.<br>Clario.<a href=\"https:\/\/clario.co\/blog\/illegal-things-you-do-online\/\">https:\/\/clario.co\/blog\/illegal-things-you-do-online\/<\/a><a href=\"https:\/\/clario.co\/blog\/illegal-things-you-do-online\/\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<p><strong>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Career Paper<\/h2>\n\n\n\n<p class=\"has-text-align-left\"><strong>Introduction<\/strong><br>Cybersecurity experts play a crucial role in safeguarding organizations against digital threats.<br>While technical skills are fundamental, incorporating social science principles is essential in this<br>field. This study explores how cybersecurity professionals apply social science research and<br>theories in their work, focusing on the impact of cybersecurity on marginalized communities and<br>society as a whole.<br><br><strong>Understanding Online Behavior through Social Science<\/strong><br>In the realm of cybersecurity, analysts heavily rely on social science concepts to understand<br>and predict behavior online. Social engineering, a significant concern in cybersecurity, is deeply<br>rooted in sociological insights. Analysts need to grasp how cyber attackers manipulate<br>vulnerabilities like trust and authority bias to breach systems (Wongkrachang, n.d.).<br><br><strong>Conflict Theory in Cybersecurity<\/strong><br>The application of conflict theory, which examines social structures through power imbalances,<br>holds significance in the field of cybersecurity. Analysts must assess how power dynamics<br>observed in society manifest themselves in cyberspace. For instance, cyber attacks sponsored<br>by governments often reflect geopolitical tensions and struggles for dominance between nations<br>(Pavlova, 2020).<br><br><strong>Peer Networks and Cyberbullying<\/strong><br>An understanding of peer networks and their impact on behavior is essential for cybersecurity<br>experts when addressing issues like cyberbullying. Knowing how online communities function and influence behaviors, whether fostering or combating harmful actions, is crucial for<br>developing effective cybersecurity measures (Wongkrachang, n.d.).<br><br><strong>Protecting Religious Communities Online<\/strong><br>Cybersecurity experts need to be aware of the targeting of religious communities online. It&#8217;s<br>crucial to grasp the vulnerabilities these groups face and create customized security plans. For<br>instance, religious institutions could be at risk of hate crimes or misinformation campaigns,<br>necessitating specific cybersecurity precautions (Pavlova, 2020).<br><br><strong>Urban Cybersecurity Challenges<\/strong><br>The concept of &#8220;Cities and Cybersecurity&#8221; is increasingly relevant as urban areas become more<br>technologically integrated. Cybersecurity analysts working with smart city initiatives must<br>consider the complex interplay between urban infrastructure, population density, and digital<br>vulnerabilities (Khatoun &amp; Zeadally, 2017).<br><br><strong>Sociological Lens in Cybersecurity<\/strong><br>Analysts must view cybersecurity through a sociological lens, considering how social structures<br>and institutions influence digital security. This includes understanding how different societal<br>groups perceive and interact with technology, which can inform more effective security policies<br>and education programs (Wongkrachang, n.d.).<br><br><strong>Protecting Marginalized Groups and Societal Impact<\/strong><br>Cybersecurity analysts play a vital role in protecting marginalized groups from digital threats.<br>This involves recognizing the unique vulnerabilities of marginalized communities in cyberspace,<br>developing inclusive security strategies that address diverse needs, and advocating for equal<br>access to cybersecurity education and resources (Pavlova, 2020). On a broader societal level,<br>cybersecurity analysts contribute to maintaining the integrity of critical infrastructure that society<br>depends on, protecting democratic processes from cyber interference, and fostering trust in<br>digital systems, which is crucial for social and economic development.<br><br><strong>Conclusion<\/strong><br>The role of a cybersecurity analyst extends far beyond technical expertise. By integrating social<br>science principles, these professionals can develop more comprehensive and effective<br>strategies to protect individuals, organizations, and society as a whole from evolving cyber<br>threats. The interdisciplinary nature of this field highlights the importance of a holistic approach<br>to cybersecurity that considers both technological and social factors.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>Sources:<\/strong><br>Khatoun, R., &amp; Zeadally, S. (2017). Cybersecurity and privacy solutions in smart cities. IEEE<br>Communications Magazine, 55(3), 51-59. <a href=\"https:\/\/doi.org\/10.1109\/MCOM.2017.1600297CM\">https:\/\/doi.org\/10.1109\/MCOM.2017.1600297CM<\/a><br><br>Pavlova, P. (1970, January 1). Human rights-based approach to cybersecurity: Addressing the<br>security risks of targeted groups. Peace Human Rights Governance.<br><a href=\"https:\/\/phrg.padovauniversitypress.it\/2020\/3\/4\">https:\/\/phrg.padovauniversitypress.it\/2020\/3\/4<\/a><br><br>Wongkrachang, S. (n.d.-a). Cybersecurity awareness and training programs for racial and<br>sexual minority populations: An examination of effectiveness and best practices. Contemporary<br>Issues in Behavioral and Social Sciences.<\/p>\n\n\n\n<p><strong>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Module 14 Journal Entry&nbsp;<\/h2>\n\n\n\n<p class=\"has-text-align-left\">Today I spent some time reflecting on Davin Teos TEDx talk discussing his journey, in<br>forensics. It struck me how closely connected this field is to social sciences like criminology and<br>sociology. Teos progression into forensics is quite intriguing. Starting off as an accountant with<br>an interest in IT he stumbled upon an opportunity within Australias early national digital forensic<br>scene. This non traditional path underscores the nature of forensics merging technology, law<br>and investigative practices. What particularly intrigued me was how Teos work intersects with<br>concepts. His investigations often delve into analyzing behavior in realms unveiling patterns of<br>deviance and exploring the impact of technology on social dynamics. For instance his case<br>study involving a torrent site within an IT department exemplifies how subcultures can emerge<br>within organizations \u2013 a principle in organizational sociology. Furthermore Teos work delves into<br>realms by tackling cyber threats, fraud cases and even instances of death threats. His<br>investigative approach aligns with theories such as routine activity theory, by identifying<br>vulnerabilities exploited by cybercriminals.<br><\/p>\n\n\n\n<p class=\"has-text-align-left\">The advancements, in technology within this field. Transitioning from disks to terabyte drives.<br>Also mirror societal shifts and their influence, on criminal activities and investigative methods.<br>Teo&#8217;s career path demonstrates the importance of adaptability and continuous learning in our<br>rapidly changing digital world. It also shows how diverse backgrounds can contribute to this<br>field, suggesting that the future of digital forensics might benefit from even more interdisciplinary<br>approaches, perhaps incorporating more explicit sociological and criminological training.<br>Overall, Teo&#8217;s talk reinforced for me how digital forensics serves as a crucial bridge between<br>technology and the social sciences in our increasingly digital society.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>References<\/strong><br>List your References in APA Format Below<br><\/p>\n\n\n\n<p class=\"has-text-align-left\">Digital Forensics: Davin Teo: Tedxhongkongsalon. YouTube. (2015, December 9). <br><a href=\"https:\/\/youtu.be\/Pf-JnQfAEew?si=aBTJXC26cuRvsQur\">https:\/\/youtu.be\/Pf-JnQfAEew?si=aBTJXC26cuRvsQur<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity and the Social Sciences \u00a0 Module 1 Journal EntryChase DickersonJun 15The &#8220;Analyze&#8221; category appeals to me due to its focus on identifying and interpreting data to uncoversecurity threats. This role involves critical thinking and a deep understanding of cyber threats, which I findintellectually stimulating. It&#8217;s highly intriguing. Identifying threats through data analysis &#8211; cerebral&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/chasedickerson\/cyse-201s\/\">Read More<\/a><\/div>\n","protected":false},"author":28696,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/chasedickerson\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/chasedickerson\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/chasedickerson\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chasedickerson\/wp-json\/wp\/v2\/users\/28696"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chasedickerson\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/chasedickerson\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":331,"href":"https:\/\/sites.wp.odu.edu\/chasedickerson\/wp-json\/wp\/v2\/pages\/123\/revisions\/331"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/chasedickerson\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}